DefensiveOrigins / APTv4_Defcon28
Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends
☆24Updated 4 years ago
Alternatives and similar repositories for APTv4_Defcon28:
Users that are interested in APTv4_Defcon28 are comparing it to the libraries listed below
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Wireless Pentesting Device☆20Updated 4 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆13Updated 2 months ago
- ☆34Updated 2 months ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- ☆41Updated 11 months ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Updated 6 years ago
- ☆20Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- Various components we use in labs☆10Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Continuous kerberoast monitor☆44Updated last year
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- ☆16Updated 7 years ago
- Threat Mitigation Strategies☆25Updated last year
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- BloodHound Data Scanner☆44Updated 4 years ago
- ☆26Updated 3 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated last year
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- My Python Cookiecutter project template☆30Updated 2 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- Pass-thru web server for traffic redirection☆24Updated 5 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 7 months ago